Sciweavers

4493 search results - page 849 / 899
» A Knowledge Recommend System Based on User Model
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
MOBISYS
2005
ACM
16 years 3 months ago
Reincarnating PCs with portable SoulPads
The ability to walk up to any computer, personalize it, and use it as one's own has long been a goal of mobile computing research. We present SoulPad, a new approach based on...
Ramón Cáceres, Casey Carter, Chandra...
CSE
2009
IEEE
15 years 11 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
CBMS
2006
IEEE
15 years 10 months ago
Pre-Indexing for Fast Partial Shape Matching of Vertebrae Images
Fast retrieval of images from large databases especially from large medical image databases is of great interest to researchers. We have developed shape-based image retrieval syst...
Xiaoqian Xu, D. J. Lee, Sameer Antani, L. Rodney L...
WWW
2007
ACM
16 years 4 months ago
Towards Deeper Understanding of the Search Interfaces of the Deep Web
Many databases have become Web-accessible through form-based search interfaces (i.e., HTML forms) that allow users to specify complex and precise queries to access the underlying ...
Hai He, Weiyi Meng, Yiyao Lu, Clement T. Yu, Zongh...